Search

EP-4740364-A1 - METHOD AND SYSTEM FOR MODERATING INCOMING REQUESTS

EP4740364A1EP 4740364 A1EP4740364 A1EP 4740364A1EP-4740364-A1

Abstract

The present disclosure relates to a system (125) and a method (500) for moderating incoming requests The system (125) includes a transceiver (220) to receive a request from a foreign SEPP (104). The system (125) includes a determination module (225) to determine if a set of predefined parameters of the foreign SEPP (104) which raised the request within a preset threshold. The system (125) further includes a retrieving module (230) to retrieve a set of features from the request in response to the set of predefined parameters within the preset threshold. The system (125) further includes a checking module (235) to ascertain if the retrieved operation type is defined in a blacklist policy of a home SEPP (110). The system (125) further includes a processing module (240) to process the request received from the foreign SEPP (104) in response to absence of the retrieved operation type in the blacklist policy.

Inventors

  • BHATNAGAR, AAYUSH
  • BISHT, SANDEEP
  • MISHRA, RAHUL
  • Chillapalli, Jyothi Durga Prasad

Assignees

  • Jio Platforms Limited

Dates

Publication Date
20260513
Application Date
20240701

Claims (20)

  1. 1. A method (500) of moderating incoming requests, the method (500) comprising the steps of: receiving (502), by one or more processors (205), a request from a foreign Security Edge Protection Proxy (SEPP) (104); determining (504), by the one or more processors (205), if a set of predefined parameters of the foreign SEPP (104) which raised the request is within a preset threshold, wherein the set of predefined parameters is at least one of a utilization or rate limit of the foreign SEPP (104); retrieving (506), by the one or more processors (205), a set of features from the request in response to the set of predefined parameters being within the preset threshold, wherein the set of features include a Uniform Resource Identifier (URI) and an operation type; ascertaining (508), by the one or more processors (205), if the retrieved operation type is defined in a blacklist policy of a home SEPP (110) based on retrieving the set of features from the request; and processing (510), by the one or more processors (205), the request received from the foreign SEPP (104) in response to the absence of the retrieved operation type in the blacklist policy of the home SEPP (110).
  2. 2. The method (500) as claimed in claim 1, wherein the one or more processors (205) is located within the home SEPP (110).
  3. 3. The method (500) as claimed in claim 1, wherein the set of predefined parameters are configured based on predictive analysis utilizing machine learning techniques.
  4. 4. The method (500) as claimed in claim 1, wherein if the set of predefined parameters are not within the preset threshold, the one or more processors (205) further comprises the step of transmitting an error response to the foreign SEPP (104).
  5. 5. The method (500) as claimed in claim 1, wherein the URI corresponds to one of an endpoint and resource being targeted by the request.
  6. 6. The method (500) as claimed in claim 1, wherein the operation type pertains to a type of operation to be performed on one of an endpoint and a resource, and wherein the operation type to be performed is one of a GET, POST, PUT, and DELETE.
  7. 7. The method (500) as claimed in claim 1, wherein if the retrieved operation type is included in the blacklist policy of the home SEPP (110), the one or more processors (205) performs the step of transmitting an error response to the foreign SEPP (104).
  8. 8. The method (500) as claimed in claim 1, wherein the method (500) further comprises the step of, transmitting, by the one or more processors (205) the request to a North Bound Interface (NBI) (255) for further processing in order to process the request received from the foreign SEPP (104).
  9. 9. The method (500) as claimed in claim 1, wherein the method (500) further comprises the step of: segregating (512), by the one or more processors (205), each of the request received based on a network function type, a Hyper Text Transfer Protocol (HTTP) method, Application Programming Interface (API), Public Land Mobile Network (PLMN) identifier, and Internet Protocol (IP) endpoints.
  10. 10. The method (500) as claimed in claim 1, wherein the method (500) further comprises the step of moderating (514), by the one or more processors (205), each of the request received based on the set of predefined parameters.
  11. 11. The method (500) as claimed in claim 1, wherein the blacklist policy pertains to preconfigured information corresponding to a segregation criterion, Application Programming Interfaces (API) for which moderation of requests is one of enable and disabled, the set of predefined parameters and the preset thresholds on enablement of the moderation of requests, and actions to be invoked on breach of the preset thresholds.
  12. 12. A system (125) for moderating incoming requests, the system (125) comprising: a transceiver (220) configured to receive, a request from a foreign Security Edge Protection Proxy (SEPP) (104); a determination module (225) configured to determine, if a set of predefined parameters of the foreign SEPP (104) which raised the request is within a preset threshold, wherein the set of predefined parameters is at least one of a utilization or rate limit of the foreign SEPP (104); a retrieving module (230) configured to retrieve, a set of features from the request in response to the set of predefined parameters being within the preset threshold, wherein the set of features include a Uniform Resource Identifier (URI) and an operation type; a checking module (235) configured to ascertain, if the retrieved operation type is defined in a blacklist policy of a home SEPP (110) based on retrieving the set of features from the request; and a processing module (240) configured to process, the request received from the foreign SEPP (104) in response to the absence of the retrieved operation type in the blacklist policy of the home SEPP (110).
  13. 13. The system (125) as claimed in claim 12, wherein the set of predefined parameters are configured based on predictive analysis utilizing machine learning techniques.
  14. 14. The system (125) as claimed in claim 12, wherein the transceiver (220) is further configured to transmit an error response to the foreign SEPP (104) if the set of predefined parameters are not within the preset threshold.
  15. 15. The system (125) as claimed in claim 12, wherein the URI corresponds to one of an endpoint and resource being targeted by the request.
  16. 16. The system (125) as claimed in claim 12, wherein the operation type pertains to a type of operation to be performed on one of an endpoint and a resource, and wherein the operation type to be performed is one of a GET, POST, PUT, and DELETE.
  17. 17. The system (125) as claimed in claim 12, wherein the transceiver (220) is further configured to transmit an error response to the foreign SEPP (104) if the retrieved operation type is included in the blacklist policy of the home SEPP (HO).
  18. 18. The system (125) as claimed in claim 12, wherein the transceiver (220) is configured to transmit the request to a North Bound Interface (NBI) (255) for further processing in order to process the request received from the foreign SEPP (104).
  19. 19. The system (125) as claimed in claim 12, wherein the system (125) further comprises a segregation module (245) configured to segregate each of the request received based on a network function type, a Hyper Text Transfer Protocol (HTTP) method, Application Programming Interface (API), Public Land Mobile Network (PLMN) identifier, and Internet Protocol (IP) endpoints.
  20. 20. The system (125) as claimed in claim 12, wherein the system (125) further comprises a moderation module (250) configured to moderate each of the request received based on the set of predefined parameters.

Description

METHOD AND SYSTEM FOR MODERATING INCOMING REQUESTS FIELD OF THE INVENTION [0001] The present invention generally relates to network security, and more particularly relates to a method and system for moderating incoming requests. BACKGROUND OF THE INVENTION [0002] Security Edge Protection Proxy (SEPP) plays a significant role in maintaining the security and integrity of Application Programming Interface (API) access, in network systems. SEPP acts as a security gateway or intermediary between clients and APIs, implementing security controls to protect the API infrastructure and to this end, the SEPP may implement various measures, such as authentication and authorization mechanisms, rate limiting, input validation, etc. By employing SEPP, organizations can ensure that API access is secure, only authorized users can interact with APIs, and potential security threats or attacks are detected and mitigated effectively. [0003] In applications or systems where, blacklisting mechanisms are not implemented, the absence of effective spam request handling poses a significant problem. Without the ability to selectively block or filter incoming requests, the system is forced to process all requests it receives, leaving it vulnerable to a high volume of spam requests from attackers. This influx of spam requests, if left unchecked, can overwhelm the system and potentially lead to a system crash, compromising its stability and availability. [0004] One common approach to mitigate the impact of spam requests is by implementing rate limiting techniques. Rate limiting serves as a protective measure by imposing restrictions on network traffic, preventing users from exhausting system resources. By limiting the rate at which requests are accepted and processed, rate limiting makes it more challenging for malicious actors to overload the system and launch attacks such as Denial of Service (DoS), where the goal is to saturate network capacity, storage, and memory. [0005] However, even with rate limiting in place, there are instances where the system may encounter spam requests that exhibit slight changes in parameters. This presents a challenge as these modified requests may bypass simple rate limiting measures and continue to disrupt the system. [0006] Thus, there is a need for a solution which solves the above problems. SUMMARY OF THE INVENTION [0007] One or more embodiments of the present disclosure provide a system and a method for moderating incoming requests. [0008] In one aspect of the present invention, a system for moderating incoming requests is disclosed. The system includes a transceiver configured to receive a request from a foreign Security Edge Protection Proxy (SEPP). Further, the system includes a determination module configured to determine if a set of predefined parameters of the foreign SEPP which raised the request is within a preset threshold. The set of predefined parameters is at least one of a utilization or rate limit of the foreign SEPP. The system further includes a retrieving module configured to retrieve a set of features from the request in response to the set of predefined parameters being within the preset threshold. The set of features includes a Uniform Resource Identifier (URI) and an operation type. The system further includes a checking module configured to ascertain if the retrieved operation type is defined in a blacklist policy of a home SEPP based on retrieving the set of features from the request. Further, the system includes a processing module configured to process the request received from the foreign SEPP in response to the absence of the retrieved operation type in the blacklist policy of the home SEPP. [0009] In one embodiment, the set of predefined parameters are configured based on predictive analysis utilizing machine learning techniques. [0010] In another embodiment, the transceiver is further configured to transmit an error response to the foreign SEPP if the set of predefined parameters are not within the preset threshold. [0011] In yet another embodiment, the URI corresponds to one of an endpoint and resource being targeted by the request. [0012] In yet another embodiment, the operation type pertains to a type of operation to be performed on one of an end point and a resource, and wherein the operation type to be performed is one of a GET, POST, PUT, and DELETE. [0013] In yet another embodiment, the transceiver is further configured to transmit the error response to the foreign SEPP if the retrieved operation type is included in the blacklist policy of the home SEPP. [0014] In yet another embodiment, the transceiver is configured to transmit the request to a North Bound Interface (NBI) for further processing in order to process the request received from the foreign SEPP. [0015] In yet another embodiment, the system further includes the segregation module configured to segregate each of the request received based on a network function type, a Hyper Text Transfer Protocol (HT